public inbox for gcc-patches@gcc.gnu.org
 help / color / mirror / Atom feed
From: Jeff Law <law@redhat.com>
To: Martin Sebor <msebor@gmail.com>,
	Gcc Patch List <gcc-patches@gcc.gnu.org>
Subject: Re: [PATCH 3/4] enhance overflow and truncation detection in strncpy and strncat (PR 81117)
Date: Thu, 10 Aug 2017 07:17:00 -0000	[thread overview]
Message-ID: <e0d6edfe-aded-1fe1-a4fe-23644cbf627d@redhat.com> (raw)
In-Reply-To: <d1fd572a-6bff-d95b-1b9e-23527e8ea14b@gmail.com>

On 08/06/2017 02:07 PM, Martin Sebor wrote:
> Part 3 of the series contains the meat of the patch: the new
> -Wstringop-truncation option, and enhancements to -Wstringop-
> overflow, and -Wpointer-sizeof-memaccess to detect misuses of
> strncpy and strncat.
> 
> Martin
> 
> gcc-81117-3.diff
> 
> 
> PR c/81117 - Improve buffer overflow checking in strncpy
> 
> gcc/ChangeLog:
> 
> 	PR c/81117
> 	* builtins.c (compute_objsize): Handle arrays that
> 	compute_builtin_object_size likes to fail for.  Make extern.
> 	* builtins.h (compute_objsize): Declare.
> 	(check_strncpy_sizes): New function.
> 	(expand_builtin_strncpy): Call check_strncpy_sizes.
> 	* gimple-fold.c (gimple_fold_builtin_strncpy): Implement
> 	-Wstringop-truncation.
> 	(gimple_fold_builtin_strncat): Same.
> 	* gimple.c (gimple_build_call_from_tree): Set call location.
> 	* tree-ssa-strlen.c (strlen_to_stridx): New global variable.
> 	(maybe_diag_bound_equal_length, is_strlen_related_p): New functions.
> 	(handle_builtin_stxncpy, handle_builtin_strncat): Same.
> 	(handle_builtin_strlen): Use strlen_to_stridx.
> 	(strlen_optimize_stmt): Handle flavors of strncat, strncpy, and
> 	stpncpy.
> 	Use strlen_to_stridx.
> 	(pass_strlen::execute): Release strlen_to_stridx.
> 	* doc/invoke.texi (-Wsizeof-pointer-memaccess): Document enhancement.
> 	(-Wstringop-truncation): Document new option.
> 
> gcc/c-family/ChangeLog:
> 
> 	PR c/81117
> 	* c-warn.c (sizeof_pointer_memaccess_warning): Handle arrays.
> 	* c.opt (-Wstriingop-truncation): New option.
> 
> gcc/testsuite/ChangeLog:
> 
> 	PR c/81117
> 	* c-c++-common/Wsizeof-pointer-memaccess3.c: New test.
> 	* c-c++-common/Wstringop-overflow.c: Same.
> 	* c-c++-common/Wstringop-truncation.c: Same.
> 	* c-c++-common/Wsizeof-pointer-memaccess2.c: Adjust.
> 	* c-c++-common/attr-nonstring-2.c: New test.
> 	* g++.dg/torture/Wsizeof-pointer-memaccess1.C: Adjust.
> 	* g++.dg/torture/Wsizeof-pointer-memaccess2.C: Same.
> 	* gcc.dg/torture/pr63554.c: Same.
> 	* gcc.dg/Walloca-1.c: Disable macro tracking.
> 
> diff --git a/gcc/builtins.c b/gcc/builtins.c
> index 016f68d..1aa9e22 100644
> --- a/gcc/builtins.c
> +++ b/gcc/builtins.c
[ ... ]
> +
> +  if (TREE_CODE (type) == ARRAY_TYPE)
> +    {
> +      /* Return the constant size unless it's zero (that's a zero-length
> +	 array likely at the end of a struct).  */
> +      tree size = TYPE_SIZE_UNIT (type);
> +      if (size && TREE_CODE (size) == INTEGER_CST
> +	  && !integer_zerop (size))
> +	return size;
> +    }
Q. Do we have a canonical test for the trailing array idiom?   In some
contexts isn't it size 1?  ISTM This test needs slight improvement.
Ideally we'd use some canonical test for detect the trailing array idiom
rather than open-coding it here.  You might look at the array index
warnings in tree-vrp.c to see if it's got a canonical test you can call
or factor and use.




> @@ -3883,6 +3920,30 @@ expand_builtin_strncat (tree exp, rtx)
>    return NULL_RTX;
>  }
>  
> +/* Helper to check the sizes of sequences and the destination of calls
> +   to __builtin_strncpy (DST, SRC, LEN) and __builtin___strncpy_chk.
> +   Returns true on success (no overflow warning), false otherwise.  */
> +
> +static bool
> +check_strncpy_sizes (tree exp, tree dst, tree src, tree len)
> +{
> +  tree dstsize = compute_objsize (dst, warn_stringop_overflow - 1);
> +
> +  if (!check_sizes (OPT_Wstringop_overflow_,
> +		    exp, len, /*maxlen=*/NULL_TREE, src, dstsize))
> +    return false;
> +
> +  if (!dstsize || TREE_CODE (len) != INTEGER_CST)
> +    return true;
> +
> +  if (tree_int_cst_lt (dstsize, len))
> +    warning_at (EXPR_LOCATION (exp), OPT_Wstringop_truncation,
> +		"%K%qD specified bound %E exceeds destination size %E",
> +		exp, get_callee_fndecl (exp), len, dstsize);
> +
> +  return true;
So in the case where you issue the warning, what should the return value
be?  According to the comment it should be false.  It looks like you got
the wrong return value for the tree_int_cst_lt (dstsize, len) test.





>  
>    return false;
> diff --git a/gcc/tree-ssa-strlen.c b/gcc/tree-ssa-strlen.c
> index b0563fe..ac6503f 100644
> --- a/gcc/tree-ssa-strlen.c
> +++ b/gcc/tree-ssa-strlen.c

> +
> +/* A helper of handle_builtin_stxncpy.  Check to see if the specified
> +   bound is a) equal to the size of the destination DST and if so, b)
> +   if it's immediately followed by DST[LEN - 1] = '\0'.  If a) holds
> +   and b) does not, warn.  Otherwise, do nothing.  Return true if
> +   diagnostic has been issued.
> +
> +   The purpose is to diagnose calls to strncpy and stpncpy that do
> +   not nul-terminate the copy while allowing for the idiom where
> +   such a call is immediately followed by setting the last element
> +   to nul, as in:
> +     char a[32];
> +     strncpy (a, s, sizeof a);
> +     a[sizeof a - 1] = '\0';
> +*/
So using gsi_next to find the next statement could make the heuristic
fail to find the a[sizeof a - 1] = '\0'; statement when debugging is
enabled.

gsi_next_nondebug would be better as it would skip over any debug insns.

What might be even better would be to use the immediate uses of the
memory tag.  For your case there should be only one immediate use and it
should point to the statement which NUL terminates the destination.  Or
maybe that would be worse in that you only want to allow this exception
when the statements are consecutive.


> +
> +  /* Look for dst[i] = '\0'; after the stxncpy() call and if found
> +     avoid the truncation warning.  */
> +  gsi_next (&gsi);
> +  gimple *next_stmt = gsi_stmt (gsi);
Here's the gsi_next I'm referring to.


> +  else
> +    {
> +      /* The source length is uknown.  Try to determine the destination
s/uknown/unknown/



>  /* Handle a memcpy-like ({mem{,p}cpy,__mem{,p}cpy_chk}) call.
>     If strlen of the second argument is known and length of the third argument
>     is that plus one, strlen of the first argument is the same after this
> @@ -2512,6 +2789,19 @@ strlen_optimize_stmt (gimple_stmt_iterator *gsi)
You still need to rename strlen_optimize_stmt since after your changes
it does both optimizations and warnings.

I think we're going to need one more iteration on this patch within the
kit.  I'm glazing over a bit tonight.

jeff

  reply	other threads:[~2017-08-10  5:26 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-07-08 20:45 [PATCH] " Martin Sebor
2017-07-18  2:51 ` [PING] " Martin Sebor
2017-07-25  3:10   ` [PING #2] " Martin Sebor
2017-07-31 17:29 ` Jeff Law
2017-07-31 19:42   ` Martin Sebor
2017-08-02 16:59     ` Jeff Law
2017-08-06 20:07       ` [PATCH 3/4] " Martin Sebor
2017-08-10  7:17         ` Jeff Law [this message]
2017-08-10  7:39           ` Richard Biener
2017-08-10 20:21           ` Martin Sebor
2017-08-15  3:06             ` Martin Sebor
2017-08-23 21:11               ` [PING] " Martin Sebor
2017-08-29  5:07                 ` [PING 2] " Martin Sebor
2017-09-19 15:44                   ` [PING 3] " Martin Sebor
2017-09-26  2:27                     ` [PING 4] " Martin Sebor
2017-10-02 22:15             ` Jeff Law
2017-10-21  0:26               ` Martin Sebor
2017-11-04  3:49                 ` Jeff Law
2017-11-10  0:17                   ` Martin Sebor
2017-11-10  0:31                     ` Jeff Law
2017-11-14  9:24         ` [testsuite, committed] Require alloca for c-c++-common/Wstringop-truncation.c Tom de Vries
2017-11-15 15:30         ` [testsuite, committed] Compile strncpy-fix-1.c with -Wno-stringop-truncation Tom de Vries
2017-11-15 15:58           ` Martin Sebor
2017-08-06 20:07       ` [PATCH] enhance overflow and truncation detection in strncpy and strncat (PR 81117) Martin Sebor
2017-08-09 19:21         ` Jeff Law
2017-08-06 20:07       ` [PATCH 4/4] " Martin Sebor
2017-08-06 20:07       ` [PATCH 2/4] " Martin Sebor
2017-08-10  6:39         ` Jeff Law
2017-08-14 18:04           ` Martin Sebor
2017-08-14 18:29             ` Joseph Myers
2017-08-14 19:26               ` Martin Sebor
2017-08-14 20:41                 ` Joseph Myers
2017-08-14 20:44                   ` Martin Sebor
2017-08-15  3:03                     ` Joseph Myers
2017-11-10 23:03         ` Marc Glisse
2017-11-11 21:10           ` Martin Sebor
2017-08-06 20:07       ` [PATCH 1/4] " Martin Sebor
2017-08-10  5:02         ` Jeff Law
2017-08-14 19:21           ` Martin Sebor

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=e0d6edfe-aded-1fe1-a4fe-23644cbf627d@redhat.com \
    --to=law@redhat.com \
    --cc=gcc-patches@gcc.gnu.org \
    --cc=msebor@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).